The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vacuum technology is a very widespread area. Nowadays, a broad variety of applications can be found to be using vacuum and vacuum related monitoring. Vacuum profile for different applications can be different, but whatever that may be, monitoring it is an essential part of any such application. Thus, this paper describes the development of one such vacuum profile monitoring system that can be re-purposed...
Virtualization technology starts becoming more and more widespread in the embedded space. The penalties incurred by standard software-based virtualization is pushing research towards hardware-assisted solutions. Among the existing commercial off-the-shelf technologies for secure virtualization, ARM TrustZone is attracting particular attention. However, it is often seen with some scepticism due to...
As wireless sensor networks become more ubiquitous in the world, the need for lightweight, resilient time synchronization protocols is apparent. Wireless nodes' internal clocks are subject to drift over time due to manufacturing imperfections and environmental changes. While various protocols have been introduced that attempt to correct for this drift, they each have their own peculiarities and issues...
To elevate the imperativeness and reinforce the fitness of elders, assisting a home care system can be an admittance that provides comprehensive nursing and monitoring them in the regular interim. In order to provide an interactive service management platform to the elders a smart environment of numerous sensors are clubbed together to establish an intuitive platform that can control the home appliances...
In the continual battle between malware attacks and antivirus technologies, both sides strive to deploy their techniques at always lower layers in the software system stack. The goal is to monitor and control the software executing in the levels above their own deployment, to detect attacks or to defeat defenses. Recent antivirus solutions have gone even below the software, by enlisting hardware support...
ICs are subject to many causes of malfunction such as aging or aggressive environment, while avoiding unwanted behavior of critical applications is a key issue. Monitoring is a cornerstone of safety policies, as it supports triggering counter measures on demand. High Level Synthesis (HLS) allows to easily implement applications in hardware, and some HLS compliant solutions have been reported. These...
As technology scaling reaches nanometre scales, the error rate due to variations in temperature and voltage, single event effects and component degradation increases, making components less reliable. In order to ensure a system continues to function correctly while facing known reliability issues, it is imperative that the system should have the means to detect the occurrence of errors due to the...
Cloud Service Broker federates multiple Cloud Service Providers into a single entity to customers. The benefits that can be enjoyed by Cloud Service Consumer are flexibility, ease of use, and reduced cost. However, because of the unique properties and configurations of each cloud provider, sometime it's not easy to migrate between one cloud provider to another. Furthermore, the advantage of using...
High quality requirements are set for automated production systems (aPS) as malfunctions can harm humans or cause severe financial loss. These malfunctions can be caused by faults in the control software of the aPS or its inability to correctly identify and handle unintended situations and errors in the technical process or hardware behavior. To achieve more dependable control software, software testing...
the river discharge measurement is one of the basic projects of hygrometry; it determines the water resource utilization. However, a substantial increase in the number of hydrological site, especially for the unmanned hydrometric station brought great difficulty and caused the more workload for the Hydrologists every year. With the development of sensor technology and the data acquisition and fusion...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
Billions of transistors on a chip and the power wall made embedded systems to be designed with Multiprocessor System-on-Chip (MPSoC) architectures. One utilization of MPSoCs is the Pipelined MPSoCs (PMPSoCs). As many reliable and safety critical systems are deployed with MPSoCs, denying their service would have adverse effects. One such possibility is the insertion of a hardware Trojan that performs...
The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional security mechanisms. A wind park is a good example of an...
Network Functions (NFs) are deployed in networks for a variety of purposes, e.g. monitoring, security, or performance optimization. During packet processing, NF maintains the states of processed packets and/or manipulates packets based on these states. Some of these states are per-flow states while others are multi-flow states. With the emerging of network function virtualization (NFV), it is common...
Software-Defined Networks (SDN) are constantly evolving and so is their software. One of the key advantages of SDN over traditional networks is the ability to rapidly develop and deploy new features. However, updating them often requires restarting the SDN controller and causes network downtime. In addition to such planned updates, unforeseen, accidental downtime is also a risk for SDN networks. While...
China is a large agricultural country with the largest population in the world. This creates a high demand for food, which is prompting the study of high quality and high-yielding crops. China's current agricultural production is sufficient to feed the nation; however, compared with developed countries agricultural farming is still lagging behind, mainly due to the fact that the system of growing...
Internet-connected embedded systems have limited capabilities to defend themselves against remote hacking attacks. The potential effects of such attacks, however, can have a significant impact in the context of the Internet of Things, industrial control systems, smart health systems, etc. Embedded systems cannot effectively utilize existing software-based protection mechanisms due to limited processing...
The design shift proposed by OpenFlow, with its simple stateless dataplane, initially contributed to the success of Software-Defined Networks. Its lack of state, however, prevents the implementation of many dataplane algorithms. Network applications must therefore offload stateful operations to the control plane, thereby increasing latency and limiting network scalability. Thus, recent research efforts...
The growing demand for flexibility and cost reduction in the telecommunication landscape directs the focus of service development heavily to programmability and softwarization. In the domain of Network Function Virtualization (NFV), one of the goals is to replace dedicated hardware devices (such as switches, routers, firewalls) with software-based network functionalities, showing comparable performance...
Many techniques have been proposed in literature to cope with transient, permanent and malicious faults in computing systems. Among these techniques for reliability improvement and fault tolerance, Control Flow Checking allows covering any fault affecting the part of the storing elements containing the executable program, as well as all the hardware components handling the program itself and its flow...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.